Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-1623

Опубликовано: 08 фев. 2013
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.3

Описание

The TLS and DTLS implementations in wolfSSL CyaSSL before 2.5.0 do not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.

РелизСтатусПримечание
devel

DNE

hardy

DNE

lucid

DNE

oneiric

released

5.1.69-0ubuntu0.11.10.1
precise

DNE

quantal

DNE

raring

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

not-affected

hardy

DNE

lucid

DNE

oneiric

DNE

precise

released

5.5.31-0ubuntu0.12.04.1
quantal

released

5.5.31-0ubuntu0.12.10.1
raring

released

5.5.31-0ubuntu0.13.04.1
upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

DNE

lucid

released

5.1.69-0ubuntu0.10.04.1
oneiric

DNE

precise

DNE

quantal

DNE

raring

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 76%
0.00935
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

redhat
около 13 лет назад

The TLS and DTLS implementations in wolfSSL CyaSSL before 2.5.0 do not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.

nvd
почти 13 лет назад

The TLS and DTLS implementations in wolfSSL CyaSSL before 2.5.0 do not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.

debian
почти 13 лет назад

The TLS and DTLS implementations in wolfSSL CyaSSL before 2.5.0 do not ...

github
больше 3 лет назад

The TLS and DTLS implementations in wolfSSL CyaSSL before 2.5.0 do not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.

EPSS

Процентиль: 76%
0.00935
Низкий

4.3 Medium

CVSS2